Index

Active Directory

    database, 19

    schema design, 19

Advanced Encryption Standard (AES), 61–64

Advanced persistent threat (APT), 45

Algorithm, 38, 40, 41, 58, 64

Android, 11, 105

Antimalware software, 13, 23

Apache, 21

Apple, 12, 19–20, 104, 105

Application security, 51–56

    environment, 53–54

    migration, 53–54

    secure developer, need for, 51–52

    test data, 53–54

    testing applications, 54–55

    using data and networks, 53

Asset sensitivity, 74

Asymmetric ciphers, encryption in, 61

Authentication, 49, 63, 67

    two-factor, 99, 108, 109

Authorization, 14, 76

Availability.See CIA model

 

Backdoors, 70, 76, 150n49

Backups, 16, 83, 109–112

Berkeley Software Distribution (BSD), 20

Big data, 28, 97–98

Black-hat hackers, 69

Get Information Technology Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.